¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180718

Ðû²¼Ê±¼ä 2018-07-18

¡¾ÆÊÎö±¨¸æ¡¿Ñо¿»ú¹¹Ðû²¼2018ÄêQ2ÍøÂç·¸·¨Ç÷ÊÆµÄÆÊÎö±¨¸æ


Malwarebytes LabsÐû²¼2018ÄêµÚ¶þ¼¾¶ÈµÄÍøÂç·¸·¨Ç÷ÊÆ±¨¸æ£¬£¬£¬£¬£¬£¬±¨¸æµÄÖ÷Òª·¢Ã÷°üÀ¨£º¶ñÒâÍÚ¿óÈȶÈÈÔÈ»ºÜ¸ß£¬£¬£¬£¬£¬£¬µ«ÒÑ×îÏÈϽµ£»£»£»£»£»GandCrab³ÉΪÀÕË÷Èí¼þµÄÍõÕߣ»£»£»£»£»¹ã¸æÈí¼þÏà±ÈÉÏÒ»¼¾¶ÈÔöÌí19%£»£»£»£»£»VPNFilterµÄ¼ì²â´ÎÊýÁè¼Ý50Íò´Î£»£»£»£»£»ExploitsÕýÔÚÉÏÉý£»£»£»£»£»Õ©Æ­ÕßÔ½À´Ô½¶àµØÕë¶ÔPII£¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£©¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://blog.malwarebytes.com/malwarebytes-news/ctnt-report/2018/07/cybercrime-tactics-techniques-q2-2018/


¡¾Çå¾²Îó²î¡¿Telefonica¹ÙÍøÎó²î¿Éµ¼ÖÂÊý°ÙÍòÓû§µÄСÎÒ˽¼ÒÐÅϢй¶

Î÷°àÑÀµçÐŹ«Ë¾TelefonicaµÄ¹Ì»°¡¢¿í´ø¼°¸¶·ÑµçÊÓÓªÒµMovistarµÄ¹ÙÍø±£´æÎó²î£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÊý°ÙÍòÓû§µÄСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£Movistar¹ÙÍøÉÏÓÃÓÚÉó²é·¢Æ±µÄÒ³ÃæµÄURLÖаüÀ¨ÁË·¢Æ±µÄID£¬£¬£¬£¬£¬£¬ÈκÎÓû§¶¼¿ÉÒÔͨ¹ýÐ޸ĴËIDÀ´Éó²éÆäËüÕË»§µÄÊý¾Ý¡£¡£¡£¡£Æ¾Ö¤ÐµÄGDPR»®¶¨£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾¿ÉÄÜÃæÁÙ1000Íò~2000ÍòÅ·Ôª»òÏ൱ÓÚÆäÄêÓªÒµ¶î2%~4%µÄ·£¿£¿£¿î¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/telefonica-spain-exposed-the-personal-details-of-millions-of-customers/


¡¾¹¥»÷ÊÂÎñ¡¿Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔÒâ´óÀûÈýÐÇЧÀÍÖÐÐĵĶñÒâÈí¼þ¹¥»÷»î¶¯


TG SoftµÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔÒâ´óÀûÈýÐÇЧÀÍÖÐÐĵÄÒ»Á¬¶ñÒâÈí¼þ¹¥»÷»î¶¯¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÍøÂç´¹ÂÚÓʼþ·Ö·¢¶ñÒâÈí¼þNetwireºÍnjRAT£¬£¬£¬£¬£¬£¬ÆäʹÓõÄÎó²îÊÇOffice¹«Ê½±à¼­Æ÷Îó²î£¨CVE-2017-11882£©¡£¡£¡£¡£ÕâЩ¹¥»÷»î¶¯Óë֮ǰFortinet±¨¸æµÄÕë¶Ô¶íÂÞ˹ЧÀÍÖÐÐĵĹ¥»÷»î¶¯ÏÕЩÏàͬ¡£¡£¡£¡£ÏÖÔÚ»¹²»ÇåÎú¹¥»÷ÕßµÄ×îÖÕÄ¿µÄ¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/samsung-service-centers-in-italy-targeted-in-malware-campaign/


¡¾ÍþвÇ鱨¡¿Ñо¿Ö°Ô±ÑÝʾÔõÑùͨ¹ýµÍ±¾Ç®×°±¸ÓÕÆ­GPSµ¼º½ÏµÍ³


Ñо¿Ö°Ô±¿ª·¢³öÒ»ÖÖ¿ÉÒÔαװ³ÉGPSÎÀÐÇÀ´ÓÕÆ­ÖÜΧµÄGPSÎüÊÕÆ÷µÄ¹¤¾ß£¬£¬£¬£¬£¬£¬¸Ã¹¤¾ß¿ÉÓÃÓÚÓÕÆ­³µÁ¾µÄµ¼º½ÏµÍ³¡£¡£¡£¡£Ñо¿Ö°Ô±»ùÓÚRaspberry Pi¹¹½¨ÁËÒ»¸öÎÞÏߵ緢Éä×°Ö㬣¬£¬£¬£¬£¬¹²ÆÆ·ÑÔ¼223ÃÀÔª£¬£¬£¬£¬£¬£¬¸Ã×°ÖõÄÓÐÓùæÄ£ÊÇ40~50Ã×£¬£¬£¬£¬£¬£¬ÔÚ²âÊÔÖпÉÒÔÒÔ95%µÄ׼ȷÂÊÓÕÆ­µ¼º½ÏµÍ³²¢Ð޸ļÝÊ»õè¾¶¡£¡£¡£¡£¸Ã×°ÖÃÒ»Ö±¹ã²¥ÐéαµÄ¶¨Î»ÐÅÏ¢£¬£¬£¬£¬£¬£¬Ê¹µÃ³µÁ¾ÉϵÄÎüÊÕÆ÷ÏÕЩ²»¿ÉÄÜ´ÓÎÀÐÇÉÏ»ñµÃÕæÊµµÄÊý¾Ý¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/74509/hacking/navigation-systems-hack.html


¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶӷ¢Ã÷ÍøÂçÌØ¹¤×éÖ¯BlackgearµÄй¥»÷»î¶¯


BlackgearÒ²±»³ÆÎªTopgear»òComnie£¬£¬£¬£¬£¬£¬ÊÇÒ»¸ö¿É×·ËÝÖÁ2008ÄêµÄÍøÂçÌØ¹¤»î¶¯£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÖйų́Íå¡¢º«¹úºÍÈÕ±¾¡£¡£¡£¡£ÆäÄ¿µÄ°üÀ¨µçÐÅ¡¢¹ú·À¡¢Õþ¸®¡¢º½¿Õº½ÌìÒÔ¼°¸ß¿Æ¼¼ÐÐÒµµÄ¹«Ë¾¡£¡£¡£¡£Ç÷ÊÆ¿Æ¼¼Ñо¿ÍŶӷ¢Ã÷Æä×îÐµĹ¥»÷»î¶¯Ê¹ÓÃа汾µÄProtuxºóÃźÍMaradeÏÂÔØÆ÷£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃFacebookµÈÉ罻ýÌå¾ÙÐÐC&CͨѶ¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/blackgear-cyberespionage-campaign-resurfaces-abuses-social-media-for-cc-communication/


¡¾¶ñÒâÈí¼þ¡¿Çå¾²Ñо¿ÍŶÓÐû²¼¹ØÓÚÀÕË÷Èí¼þCryaklµÄÆÊÎö±¨¸æ


¿¨°Í˹»ùʵÑéÊÒÐû²¼¹ØÓÚÀÕË÷Èí¼þCryaklµÄÆÊÎö±¨¸æ¡£¡£¡£¡£2018Äê2Ô±ÈÀûʱ¾¯·½²é»ñÁËCryaklµÄC&CЧÀÍÆ÷£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±Òò´ËµÃÒÔ¿ª·¢Ãâ·ÑµÄ½âÃܹ¤¾ß¡£¡£¡£¡£Cryakl×îÔç·ºÆðÓÚ2014Ä꣬£¬£¬£¬£¬£¬Ö÷Ҫͨ¹ýÍøÂç´¹ÂÚÓʼþÈö²¥£¬£¬£¬£¬£¬£¬Æä¹²Ñ¬È¾Á˶íÂÞ˹µÄ5Íò¶àÈË£¬£¬£¬£¬£¬£¬ÒÔ¼°ÈÕ±¾¡¢Òâ´óÀûºÍµÂ¹úµÄÊýǧÃûÓû§¡£¡£¡£¡£Cryakl°üÀ¨¶à¸ö°æ±¾£¬£¬£¬£¬£¬£¬´ÓCL 1.0.0.0ÖÁCL 1.3.1.0£¬£¬£¬£¬£¬£¬Êܺ¦Õß¿ÉʹÓÃÃ⺬»ìÃܹ¤¾ßRakhniDecryptor½âÃÜÆäÎļþ¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://securelist.com/the-return-of-fantomas-or-how-we-deciphered-cryakl/86511/